IDG Contributor Network: Have you dusted off your incident response plan?

IDG Contributor Network: Have you dusted off your incident response plan?

As a CIO or senior technology leader for your organization, it is important that you are the champion for ensuring the company’s security posture is solid. You may have a CISO at your organization, depending on the size of the company and your CISO may be very much on top of this. However, it is key that your incident response plan is solid, tested, trained and socialized with all those that would be involved when your plan is activated. 

Every week (more like daily) we see headlines about a financial institution, local government or large school system that is hacked or has become the latest victim of ransomware. In many of these cases these companies find out that their Incident Response Plan was never tested, or worse—it didn’t exist. Many organizations that have a security team and the latest SIEM (Security Information and Event Management) or other security technology, get complacent and put too much emphasis on these tools. A good security program takes a layered approach to security and looks at the organization holistically, from the firewall, to end user education.

As Thor Olavsrud wrote in “Companies complacent about data breach preparedness,” most organizations now have a plan, but these aren’t reviewed, updated or tested regularly as they should be. Olavsrud mentions as security incidents are more prevalent these days, we are seeing that organizations weren’t sufficiently prepared because their incident response plan was outdated or non-existent.

9 warning signs of bad IT architecture and see why these 10 old-school IT principles still rule. | Sign up for CIO newsletters. ]

How prepared are you?

By now you and your organization understand the concept of Incident Response (IR), and knows that this methodology will handle breaches, security incidents, ransomware, etc. A good incident response plan is well documented, communicated, trained, and tested annually at a minimum. This plan will incorporate methods that will assist you in responding timely, identifying, minimizing damage, exposure and cost of a cyber-attack. Of course, the plan will consider how best to identify, communicate and learn to prevent attacks in the future.

While you may have assigned a Security Response Team and have trained them, it is important to remind all involved to be clear thinking and focus on the task at hand, as it will be a high-pressure time for everybody. It is paramount that you and your team perform at its highest by having an effective and rapid response. Therefore, having a well-documented IR plan that allows for the team to follow it step-by-step will ensure the success of the recovery.

Don’t try and reinvent the wheel

It’s imperative that you ensure your IR plan has the foundational items needed in a successful plan and recovery. Whether you have an IR plan in place or not, you can start by validating the incident response actions against the response phases defined by NIST (National Institute of Standards and Technology). Your plan should follow the NIST Computer Security Incident Handling Guide (SP 800-61) standard and the steps are outlined as such:

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780